826 research outputs found

    Risk factors for chest infection in acute stroke: a prospective cohort study

    Get PDF
    <p><b>Background and Purpose:</b> Pneumonia is a major cause of morbidity and mortality after stroke. We aimed to determine key characteristics that would allow prediction of those patients who are at highest risk for poststroke pneumonia.</p> <p><b>Methods:</b> We studied a series of consecutive patients with acute stroke who were admitted to hospital. Detailed evaluation included the modified National Institutes of Health Stroke Scale; the Abbreviated Mental Test; and measures of swallow, respiratory, and oral health status. Pneumonia was diagnosed by set criteria. Patients were followed up at 3 months after stroke.</p> <p><b>Results:</b> We studied 412 patients, 391 (94.9%) with ischemic stroke and 21 (5.1%) with hemorrhagic stroke; 78 (18.9%) met the study criteria for pneumonia. Subjects who developed pneumonia were older (mean±SD age, 75.9±11.4 vs 64.9±13.9 years), had higher modified National Institutes of Health Stroke Scale scores, a history of chronic obstructive pulmonary disease, lower Abbreviated Mental Test scores, and a higher oral cavity score, and a greater proportion tested positive for bacterial cultures from oral swabs. In binary logistic-regression analysis, independent predictors (P<0.05) of pneumonia were age >65 years, dysarthria or no speech due to aphasia, a modified Rankin Scale score ≥4, an Abbreviated Mental Test score <8, and failure on the water swallow test. The presence of 2 or more of these risk factors carried 90.9% sensitivity and 75.6% specificity for the development of pneumonia.</p> <p><b>Conclusions:</b> Pneumonia after stroke is associated with older age, dysarthria/no speech due to aphasia, severity of poststroke disability, cognitive impairment, and an abnormal water swallow test result. Simple assessment of these variables could be used to identify patients at high risk of developing pneumonia after stroke.</p&gt

    Photon Echoes Produced by Switching Electric Fields

    Full text link
    We demonstrate photon echoes in Eu3+^{3+}:Y2_{2}SiO5_{5} by controlling the inhomogeneous broadening of the Eu3+^{3+} 7^{7}F05_{0}\leftrightarrow^{5}D0_{0} optical transition. This transition has a linear Stark shift and we induce inhomogeneous broadening by applying an external electric field gradient. After optical excitation, reversing the polarity of the field rephases the ensemble, resulting in a photon echo. This is the first demonstration of such a photon echo and its application as a quantum memory is discussed.Comment: improved introduction, including theoretical outline of the relvant quantum memory proposa

    Who needs a stapling device for haemorrhoidectomy, if one has the radiofrequency device?

    Get PDF
    Peer reviewedPublisher PD

    The nitrogen-vacancy center in diamond re-visited

    Full text link
    Symmetry considerations are used in presenting a model of the electronic structure and the associated dynamics of the nitrogen-vacancy center in diamond. The model accounts for the occurrence of optically induced spin polarization, for the change of emission level with spin polarization and for new measurements of transient emission. The rate constants given are in variance to those reported previously.Comment: 12 pages 10 figure

    Role of contrast-enhanced ultrasound (CEUS) in paediatric practice: an EFSUMB position statement

    Get PDF
    The use of contrast-enhanced ultrasound (CEUS) in adults is well established in many different areas, with a number of current applications deemed off-label, but the use supported by clinical experience and evidence. Paediatric CEUS is also an off-label application until recently with approval specifically for assessment of focal liver lesions. Nevertheless there is mounting evidence of the usefulness of CEUS in children in many areas, primarily as an imaging technique that reduces exposure to radiation, iodinated contrast medium and the patient-friendly circumstances of ultrasonography. This position statement of the European Federation of Societies in Ultrasound and Medicine (EFSUMB) assesses the current status of CEUS applications in children and makes suggestions for further development of this technique

    More capable others? Education Studies undergraduates as near-peer mentors for year 12 students

    Get PDF
    This research focused on the benefits and challenges for second year Education Studies undergraduate students acting as near-peer mentors for year12 students(aged 16-17). Near-peer mentoring often involves postgraduate students working with new undergraduates and is more common during Science Technology Engineering and Maths (STEM) programmes. There is little research available, outside of STEM, about how near-peer mentors might influence the aspirations of students to access HE, or of the impact on undergraduate mentors themselves. The student near-peer mentors were part of the Research Higher project in an area of England with unexplained low participation rates in HE. The project involved circa 200 students from local schools in a programme of weekly events where they designed and conducted their own research. Second year Education Studies undergraduate students supported twocohorts of year12 students during their on-campus seminar activities. The findings draw on thematic analysis of undergraduate student interviews at the end of the project. They indicate that near-peer mentoring has unexpected benefits for undergraduate Education Studies students including meta-cognition about their own learning and confidence in working with older students. Recommendations for future near-peer mentoring programmes are proposed based on student feedback. Key Words Mentoring; near-peer; higher education; widening participation; research; undergraduat

    Stoics against stoics in Cudworth's "A Treatise of Freewill"

    Get PDF
    In his 'A Treatise of Freewill', Ralph Cudworth argues against Stoic determinism by drawing on what he takes to be other concepts found in Stoicism, notably the claim that some things are ‘up to us’ and that these things are the product of our choice. These concepts are central to the late Stoic Epictetus and it appears at first glance as if Cudworth is opposing late Stoic voluntarism against early Stoic determinism. This paper argues that in fact, despite his claim to be drawing on Stoic doctrine, Cudworth uses these terms with a meaning first articulated only later, by the Peripatetic commentator Alexander of Aphrodisias

    Brokered Graph State Quantum Computing

    Full text link
    We describe a procedure for graph state quantum computing that is tailored to fully exploit the physics of optically active multi-level systems. Leveraging ideas from the literature on distributed computation together with the recent work on probabilistic cluster state synthesis, our model assigns to each physical system two logical qubits: the broker and the client. Groups of brokers negotiate new graph state fragments via a probabilistic optical protocol. Completed fragments are mapped from broker to clients via a simple state transition and measurement. The clients, whose role is to store the nascent graph state long term, remain entirely insulated from failures during the brokerage. We describe an implementation in terms of NV-centres in diamond, where brokers and clients are very naturally embodied as electron and nuclear spins.Comment: 5 pages, 3 figure

    Device-independent quantum key distribution secure against collective attacks

    Full text link
    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. We present here in detail the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98, 230501 (2008)]. This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit the no-signalling principle only), but only holds again collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically at each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.Comment: 25 pages, 3 figure
    corecore