826 research outputs found
Risk factors for chest infection in acute stroke: a prospective cohort study
<p><b>Background and Purpose:</b> Pneumonia is a major cause of morbidity and mortality after stroke. We aimed to determine key characteristics that would allow prediction of those patients who are at highest risk for poststroke pneumonia.</p>
<p><b>Methods:</b> We studied a series of consecutive patients with acute stroke who were admitted to hospital. Detailed evaluation included the modified National Institutes of Health Stroke Scale; the Abbreviated Mental Test; and measures of swallow, respiratory, and oral health status. Pneumonia was diagnosed by set criteria. Patients were followed up at 3 months after stroke.</p>
<p><b>Results:</b> We studied 412 patients, 391 (94.9%) with ischemic stroke and 21 (5.1%) with hemorrhagic stroke; 78 (18.9%) met the study criteria for pneumonia. Subjects who developed pneumonia were older (mean±SD age, 75.9±11.4 vs 64.9±13.9 years), had higher modified National Institutes of Health Stroke Scale scores, a history of chronic obstructive pulmonary disease, lower Abbreviated Mental Test scores, and a higher oral cavity score, and a greater proportion tested positive for bacterial cultures from oral swabs. In binary logistic-regression analysis, independent predictors (P<0.05) of pneumonia were age >65 years, dysarthria or no speech due to aphasia, a modified Rankin Scale score ≥4, an Abbreviated Mental Test score <8, and failure on the water swallow test. The presence of 2 or more of these risk factors carried 90.9% sensitivity and 75.6% specificity for the development of pneumonia.</p>
<p><b>Conclusions:</b> Pneumonia after stroke is associated with older age, dysarthria/no speech due to aphasia, severity of poststroke disability, cognitive impairment, and an abnormal water swallow test result. Simple assessment of these variables could be used to identify patients at high risk of developing pneumonia after stroke.</p>
Photon Echoes Produced by Switching Electric Fields
We demonstrate photon echoes in Eu:YSiO by controlling the
inhomogeneous broadening of the Eu
FD optical transition. This transition has
a linear Stark shift and we induce inhomogeneous broadening by applying an
external electric field gradient. After optical excitation, reversing the
polarity of the field rephases the ensemble, resulting in a photon echo. This
is the first demonstration of such a photon echo and its application as a
quantum memory is discussed.Comment: improved introduction, including theoretical outline of the relvant
quantum memory proposa
Who needs a stapling device for haemorrhoidectomy, if one has the radiofrequency device?
Peer reviewedPublisher PD
The nitrogen-vacancy center in diamond re-visited
Symmetry considerations are used in presenting a model of the electronic
structure and the associated dynamics of the nitrogen-vacancy center in
diamond. The model accounts for the occurrence of optically induced spin
polarization, for the change of emission level with spin polarization and for
new measurements of transient emission. The rate constants given are in
variance to those reported previously.Comment: 12 pages 10 figure
Role of contrast-enhanced ultrasound (CEUS) in paediatric practice: an EFSUMB position statement
The use of contrast-enhanced ultrasound (CEUS) in adults is well established in many different areas, with a number of current applications deemed off-label, but the use supported by clinical experience and evidence. Paediatric CEUS is also an off-label application until recently with approval specifically for assessment of focal liver lesions. Nevertheless there is mounting evidence of the usefulness of CEUS in children in many areas, primarily as an imaging technique that reduces exposure to radiation, iodinated contrast medium and the patient-friendly circumstances of ultrasonography. This position statement of the European Federation of Societies in Ultrasound and Medicine (EFSUMB) assesses the current status of CEUS applications in children and makes suggestions for further development of this technique
More capable others? Education Studies undergraduates as near-peer mentors for year 12 students
This research focused on the benefits and challenges for second year Education Studies undergraduate students acting as near-peer mentors for year12 students(aged 16-17). Near-peer mentoring often involves postgraduate students working with new undergraduates and is more common during Science Technology Engineering and Maths (STEM) programmes. There is little research available, outside of STEM, about how near-peer mentors might influence the aspirations of students to access HE, or of the impact on undergraduate mentors themselves. The student near-peer mentors were part of the Research Higher project in an area of England with unexplained low participation rates in HE. The project involved circa 200 students from local schools in a programme of weekly events where they designed and conducted their own research. Second year Education Studies undergraduate students supported twocohorts of year12 students during their on-campus seminar activities. The findings draw on thematic analysis of undergraduate student interviews at the end of the project. They indicate that near-peer mentoring has unexpected benefits for undergraduate Education Studies students including meta-cognition about their own learning and confidence in working with older students. Recommendations for future near-peer mentoring programmes are proposed based on student feedback.
Key Words Mentoring; near-peer; higher education; widening participation; research; undergraduat
Stoics against stoics in Cudworth's "A Treatise of Freewill"
In his 'A Treatise of Freewill', Ralph Cudworth argues against Stoic determinism by drawing on what he takes to be other concepts found in Stoicism, notably the claim that some things are ‘up to us’ and that these things are the product of our choice. These concepts are central to the late Stoic Epictetus and it appears at first glance as if Cudworth is opposing late Stoic voluntarism against early Stoic determinism. This paper argues that in fact, despite his claim to be drawing on Stoic doctrine, Cudworth uses these terms with a meaning first articulated only later, by the Peripatetic commentator Alexander of Aphrodisias
Brokered Graph State Quantum Computing
We describe a procedure for graph state quantum computing that is tailored to
fully exploit the physics of optically active multi-level systems. Leveraging
ideas from the literature on distributed computation together with the recent
work on probabilistic cluster state synthesis, our model assigns to each
physical system two logical qubits: the broker and the client. Groups of
brokers negotiate new graph state fragments via a probabilistic optical
protocol. Completed fragments are mapped from broker to clients via a simple
state transition and measurement. The clients, whose role is to store the
nascent graph state long term, remain entirely insulated from failures during
the brokerage. We describe an implementation in terms of NV-centres in diamond,
where brokers and clients are very naturally embodied as electron and nuclear
spins.Comment: 5 pages, 3 figure
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation
of the security assumptions made in usual quantum key distribution (QKD). As in
usual QKD, the security of DIQKD follows from the laws of quantum physics, but
contrary to usual QKD, it does not rely on any assumptions about the internal
working of the quantum devices used in the protocol. We present here in detail
the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98,
230501 (2008)]. This proof exploits the full structure of quantum theory (as
opposed to other proofs that exploit the no-signalling principle only), but
only holds again collective attacks, where the eavesdropper is assumed to act
on the quantum systems of the honest parties independently and identically at
each round of the protocol (although she can act coherently on her systems at
any time). The security of any DIQKD protocol necessarily relies on the
violation of a Bell inequality. We discuss the issue of loopholes in Bell
experiments in this context.Comment: 25 pages, 3 figure
- …