1,278 research outputs found
Identifying Types of Staying Facilities from Traffic Behavior Log Data
AbstractTraffic behavior surveys by hand require both a lot of money and human resources. Recently, traffic behavior surveys using information technology have been carried out. In this study, we propose a method to extract staying points from GPS-based positional data and identify the types of staying facilities by using Google Places API, a facility ontology, the regularity which is analyzed from trip chains about traffic behavior. This method could identify 68.5% types of staying facilities correctly in the evaluation using GPS location data from the Traffic Behavior Survey in Nagasaki
Spinal cord stimulation for the treatment of pain and toe ulceration associated with systemic sclerosis: a case report
Systemic sclerosis is a complex disease characterized by extensive fibrosis, microvascular alterations, and additional sequelae. Microvascular alterations can cause painful ulcers and necrosis; however, conservative or surgical treatment is often challenging in terms of healing. The study aimed to describe a toe ulcer with systemic sclerosis and its' successful treatment with spinal cord stimulation. An 83-year-old woman, who was diagnosed with systemic sclerosis over the past decade, was distressed by a non-healing toe ulcer for an extended period of time. The patient underwent spinal cord stimulation treatment with the expectation of pain relief and an improvement in microcirculatory insufficiency. Her pain scales and microcirculation improved, and the toe ulcer healed. Furthermore, the frequency of Raynaud's symptoms was reduced, and the patient's pain decreased. There was no recurrence of the ulcer and she no longer needed a cane for walking
冠動脈高度石灰化病変に対するスコアリングバルーンラクロスNon-Slip Elementを用いた冠動脈形成術-光干渉断層法による有用性の評価
Percutaneous coronary intervention (PCI) for heavily calcified lesions is challenging because these lesions are resistant to balloon dilatation and stenting. Lacrosse non-slip element (NSE) may have the potential to dilate heavily calcified lesions. We aimed to investigate predictors of successful lesion modification using Lacrosse NSE angioplasty via optical coherence tomography (OCT)-guided PCI. We investigated 32 patients with severe target lesion calcification treated with OCT-guided PCI. Successful lesion modification was defined as the complete fracture of calcification after Lacrosse NSE angioplasty. Before PCI, 172 segments with calcification were identified. After pre-dilatation using Lacrosse NSE, successful lesion modification was achieved in 117 segments (68.0%). Calcification was significantly thinner in successfully disrupted segments than in non-disrupted segments (p < 0.001). Calcification angle tended to be larger in disrupted than in non-disrupted segments (p = 0.08). Convex types were less frequently observed in disrupted than in non-disrupted segments (p < 0.001). At minimal lumen area sites, 26 segments (81.3%) were successfully modified. Similar to the overall results, the disrupted group had significantly thinner calcification than the non-disrupted group (p < 0.001). The angle of the calcified plaque was similar between the 2 groups (p = 0.39). Convex-type calcifications were less frequently observed in the disrupted group than in the non-disrupted group (p = 0.05). Receiver-operating characteristic curve analysis showed that calcification thickness < 565 μm was the best predictor of completely disrupted calcification. The thickness and shape of calcifications were predictors of successful lesion modification after Lacrosse NSE angioplasty.博士(医学)・乙第1426号・平成31年3月15日© Japanese Association of Cardiovascular Intervention and Therapeutics 2018This is a post-peer-review, pre-copyedit version of an article published in Cardiovascular intervention and therapeutics. The final authenticated version is available online at: http://dx.doi.org/10.1007/s12928-018-0553-6
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking
We propose a new AEAD mode of operation for an efficient countermeasure against side-channel attacks. Our mode achieves the smallest memory with high-order masking, by minimizing the states that are duplicated in masking. An -bit key-dependent state is necessary for achieving -bit security, and the conventional schemes always protect the entire bits with masking. We reduce the protected state size by introducing an unprotected state in the key-dependent state: we protect only a half and give another half to a side-channel adversary. Ensuring independence between the unprotected and protected states is the key technical challenge since mixing these states reveals the protected state to the adversary. We propose a new mode that achieves -bit security using a tweakable block cipher with the -bit block size. We also propose a new primitive for instantiating with by extending the SKINNY tweakable block cipher to a 64-bit plaintext block, a 128-bit key, and a -bit tweak. We make hardware performance evaluation by implementing with high-order masking for . For any , outperforms the current state-of-the-art by reducing the circuit area larger than that of the entire S-box
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode
Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several real-world attacks. In this paper, we study the context-committing security of Ascon, the lightweight permutation-based AE selected by the NIST LWC in 2023, for cryptanalysis on primitive and proof on mode. The attacker’s goal is to find a collision of a ciphertext and a tag with distinct decryption contexts in which an attacker can control all the parameters including the key. First, we propose new attacks with primitives that inject differences in N and A. The new attack on Ascon-128 improves the number of rounds from 2 to 3 and practically generates distinct decryption contexts. The new attack also works in a practical complexity on 3 rounds of Ascon-128a. Second, we prove the context-committing security of Ascon with zero padding, namely Ascon-zp, in the random permutation model. Ascon-zp achieves min {t+z/2 , n+t−k−ν/2 , c/2}-bit security with a t-bit tag, a z-bit padding, an n-bit state, a ν-bit nonce, and a c-bit inner part. This bound corresponds to min {64 + z/2 , 96} with Ascon-128 and Ascon-128a, and min {64 + z/2 , 80} with Ascon-80pq. The original Ascon (z = 0) achieves 64-bit security bounded by a generic birthday attack. By appending zeroes to the plaintext, the security can be enhanced up to 96 bits for Ascon-128 and Ascon-128a and 80 bits for Ascon-80pq
Variation of Inner Radius of Dust Torus in NGC4151
The long-term optical and near infrared monitoring observations for a type 1
act ive galactic nucleus NGC 4151 were carried out for six years from 2001 to
2006 b y using the MAGNUM telescope, and delayed response of flux variations in
the band to those in the band was clearly
detected. Based on cross correlation analysis, we precisely measured a lag time
for eight separate periods, and we found that is not
constant changing be tween 30 and 70 days during the monitoring period. Since
is the ligh t travel time from the central energy source out to the
surrounding dust torus, this is the first convincing evidence that the inner
radius of dust torus did ch ange in an individual AGN. In order to relate such
a change of with a change of AGN luminosity , we presented a
method of taking an average of th e observed -band fluxes that corresponds
to the measured value of , and we found that the time-changing track
of NGC 4151 in the versus diagram during the monitoring period
deviates from the relation of expected from dust
reverberation. This result, combined with t he elapsed time from period to
period for which was measured, indicat es that the timescale of dust
formation is about one year, which should be taken into account as a new
constraint in future studies of dust evolution in AGNs.Comment: 5 pages, 3 figures, To appear in the ApJ Lette
A combined quantum-classical method applied to material design: optimization and discovery of photochromic materials for photopharmacology applications
Integration of quantum chemistry simulations, machine learning techniques,
and optimization calculations is expected to accelerate material discovery by
making large chemical spaces amenable to computational study; a challenging
task for classical computers. In this work, we develop a combined
quantum-classical computing scheme involving the computational-basis
Variational Quantum Deflation (cVQD) method for calculating excited states of a
general classical Hamiltonian, such as Ising Hamiltonian. We apply this scheme
to the practical use case of generating photochromic diarylethene (DAE)
derivatives for photopharmacology applications. Using a data set of 384 DAE
derivatives quantum chemistry calculation results, we show that a
factorization-machine-based model can construct an Ising Hamiltonian to
accurately predict the wavelength of maximum absorbance of the derivatives,
, for a larger set of 4096 DAE derivatives. A 12-qubit cVQD
calculation for the constructed Ising Hamiltonian provides the ground and first
four excited states corresponding to five DAE candidates possessing large
. On a quantum simulator, results are found to be in
excellent agreement with those obtained by an exact eigensolver. Utilizing
error suppression and mitigation techniques, cVQD on a real quantum device
produces results with accuracy comparable to the ideal calculations on a
simulator. Finally, we show that quantum chemistry calculations for the five
DAE candidates provides a path to achieving large and
oscillator strengths by molecular engineering of DAE derivatives. These
findings pave the way for future work on applying hybrid quantum-classical
approaches to large system optimization and the discovery of novel materials.Comment: 13pages, 9 figure
String Theory on AdS_3 as Discrete Light-Cone Liouville Theory
We investigate (super) string theory on background based on an
approach of free field realization. We demonstrate that this string theory can
be reformulated as a string theory defined on a linear dilaton background along
the transverse direction (``Liouville mode'') and compactified onto along
a {\em light-like} direction.
Under this reformulation we analyze the physical spectrum as that of a free
field system, and discuss the consequences when we turn on the Liouville
potential. The discrete light-cone momentum in our framework is naturally
interpreted as the ``winding number'' of the long string configuration and is
identified with the spectral flow parameter that is introduced in the recent
work by Maldacena and Ooguri \cite{MO}.
Moreover we show that there exist infinite number of the on-shell chiral
primary states possessing the different light-cone momenta and the spectral
flow consistently acts on the space of chiral primaries. We observe that they
are also chiral primaries in the sense of space-time (or the conformal theory
of long string) and the spectrum of space-time charge is consistent
with the expectation from the -duality. We also clarify the
correspondence between our framework and the symmetric orbifold theory of
multiple long string system \cite{HS2}.Comment: 41 pages, no figure, the version to appear in Nucl. Phys. B. Section
3 and 4 are improved, and a discussion about the multiple long string system
is adde
- …