1,278 research outputs found

    Identifying Types of Staying Facilities from Traffic Behavior Log Data

    Get PDF
    AbstractTraffic behavior surveys by hand require both a lot of money and human resources. Recently, traffic behavior surveys using information technology have been carried out. In this study, we propose a method to extract staying points from GPS-based positional data and identify the types of staying facilities by using Google Places API, a facility ontology, the regularity which is analyzed from trip chains about traffic behavior. This method could identify 68.5% types of staying facilities correctly in the evaluation using GPS location data from the Traffic Behavior Survey in Nagasaki

    Spinal cord stimulation for the treatment of pain and toe ulceration associated with systemic sclerosis: a case report

    Get PDF
    Systemic sclerosis is a complex disease characterized by extensive fibrosis, microvascular alterations, and additional sequelae. Microvascular alterations can cause painful ulcers and necrosis; however, conservative or surgical treatment is often challenging in terms of healing. The study aimed to describe a toe ulcer with systemic sclerosis and its' successful treatment with spinal cord stimulation. An 83-year-old woman, who was diagnosed with systemic sclerosis over the past decade, was distressed by a non-healing toe ulcer for an extended period of time. The patient underwent spinal cord stimulation treatment with the expectation of pain relief and an improvement in microcirculatory insufficiency. Her pain scales and microcirculation improved, and the toe ulcer healed. Furthermore, the frequency of Raynaud's symptoms was reduced, and the patient's pain decreased. There was no recurrence of the ulcer and she no longer needed a cane for walking

    冠動脈高度石灰化病変に対するスコアリングバルーンラクロスNon-Slip Elementを用いた冠動脈形成術-光干渉断層法による有用性の評価

    Get PDF
    Percutaneous coronary intervention (PCI) for heavily calcified lesions is challenging because these lesions are resistant to balloon dilatation and stenting. Lacrosse non-slip element (NSE) may have the potential to dilate heavily calcified lesions. We aimed to investigate predictors of successful lesion modification using Lacrosse NSE angioplasty via optical coherence tomography (OCT)-guided PCI. We investigated 32 patients with severe target lesion calcification treated with OCT-guided PCI. Successful lesion modification was defined as the complete fracture of calcification after Lacrosse NSE angioplasty. Before PCI, 172 segments with calcification were identified. After pre-dilatation using Lacrosse NSE, successful lesion modification was achieved in 117 segments (68.0%). Calcification was significantly thinner in successfully disrupted segments than in non-disrupted segments (p < 0.001). Calcification angle tended to be larger in disrupted than in non-disrupted segments (p = 0.08). Convex types were less frequently observed in disrupted than in non-disrupted segments (p < 0.001). At minimal lumen area sites, 26 segments (81.3%) were successfully modified. Similar to the overall results, the disrupted group had significantly thinner calcification than the non-disrupted group (p < 0.001). The angle of the calcified plaque was similar between the 2 groups (p = 0.39). Convex-type calcifications were less frequently observed in the disrupted group than in the non-disrupted group (p = 0.05). Receiver-operating characteristic curve analysis showed that calcification thickness < 565 μm was the best predictor of completely disrupted calcification. The thickness and shape of calcifications were predictors of successful lesion modification after Lacrosse NSE angioplasty.博士(医学)・乙第1426号・平成31年3月15日© Japanese Association of Cardiovascular Intervention and Therapeutics 2018This is a post-peer-review, pre-copyedit version of an article published in Cardiovascular intervention and therapeutics. The final authenticated version is available online at: http://dx.doi.org/10.1007/s12928-018-0553-6

    Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking

    Get PDF
    We propose a new AEAD mode of operation for an efficient countermeasure against side-channel attacks. Our mode achieves the smallest memory with high-order masking, by minimizing the states that are duplicated in masking. An ss-bit key-dependent state is necessary for achieving ss-bit security, and the conventional schemes always protect the entire ss bits with masking. We reduce the protected state size by introducing an unprotected state in the key-dependent state: we protect only a half and give another half to a side-channel adversary. Ensuring independence between the unprotected and protected states is the key technical challenge since mixing these states reveals the protected state to the adversary. We propose a new mode HOMA\mathsf{HOMA} that achieves ss-bit security using a tweakable block cipher with the s/2s/2-bit block size. We also propose a new primitive for instantiating HOMA\mathsf{HOMA} with s=128s=128 by extending the SKINNY tweakable block cipher to a 64-bit plaintext block, a 128-bit key, and a (256+3)(256+3)-bit tweak. We make hardware performance evaluation by implementing HOMA\mathsf{HOMA} with high-order masking for d5d \le 5. For any d>0d > 0, HOMA\mathsf{HOMA} outperforms the current state-of-the-art PFB_Plus\mathsf{PFB\_Plus} by reducing the circuit area larger than that of the entire S-box

    Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode

    Get PDF
    Context-committing security of authenticated encryption (AE) that prevents ciphertexts from being decrypted with distinct decryption contexts, (K,N,A) comprising a key K, a nonce N, and associate data A is an active research field motivated by several real-world attacks. In this paper, we study the context-committing security of Ascon, the lightweight permutation-based AE selected by the NIST LWC in 2023, for cryptanalysis on primitive and proof on mode. The attacker’s goal is to find a collision of a ciphertext and a tag with distinct decryption contexts in which an attacker can control all the parameters including the key. First, we propose new attacks with primitives that inject differences in N and A. The new attack on Ascon-128 improves the number of rounds from 2 to 3 and practically generates distinct decryption contexts. The new attack also works in a practical complexity on 3 rounds of Ascon-128a. Second, we prove the context-committing security of Ascon with zero padding, namely Ascon-zp, in the random permutation model. Ascon-zp achieves min {t+z/2 , n+t−k−ν/2 , c/2}-bit security with a t-bit tag, a z-bit padding, an n-bit state, a ν-bit nonce, and a c-bit inner part. This bound corresponds to min {64 + z/2 , 96} with Ascon-128 and Ascon-128a, and min {64 + z/2 , 80} with Ascon-80pq. The original Ascon (z = 0) achieves 64-bit security bounded by a generic birthday attack. By appending zeroes to the plaintext, the security can be enhanced up to 96 bits for Ascon-128 and Ascon-128a and 80 bits for Ascon-80pq

    Variation of Inner Radius of Dust Torus in NGC4151

    Full text link
    The long-term optical and near infrared monitoring observations for a type 1 act ive galactic nucleus NGC 4151 were carried out for six years from 2001 to 2006 b y using the MAGNUM telescope, and delayed response of flux variations in the K(2.2μm)K(2.2\mu m) band to those in the V(0.55μm)V(0.55\mu m) band was clearly detected. Based on cross correlation analysis, we precisely measured a lag time Δt\Delta t for eight separate periods, and we found that Δt\Delta t is not constant changing be tween 30 and 70 days during the monitoring period. Since Δt\Delta t is the ligh t travel time from the central energy source out to the surrounding dust torus, this is the first convincing evidence that the inner radius of dust torus did ch ange in an individual AGN. In order to relate such a change of Δt\Delta t with a change of AGN luminosity LL, we presented a method of taking an average of th e observed VV-band fluxes that corresponds to the measured value of Δt\Delta t, and we found that the time-changing track of NGC 4151 in the Δt\Delta t versus LL diagram during the monitoring period deviates from the relation of ΔtL0.5\Delta t \propto L^{0.5} expected from dust reverberation. This result, combined with t he elapsed time from period to period for which Δt\Delta t was measured, indicat es that the timescale of dust formation is about one year, which should be taken into account as a new constraint in future studies of dust evolution in AGNs.Comment: 5 pages, 3 figures, To appear in the ApJ Lette

    A combined quantum-classical method applied to material design: optimization and discovery of photochromic materials for photopharmacology applications

    Full text link
    Integration of quantum chemistry simulations, machine learning techniques, and optimization calculations is expected to accelerate material discovery by making large chemical spaces amenable to computational study; a challenging task for classical computers. In this work, we develop a combined quantum-classical computing scheme involving the computational-basis Variational Quantum Deflation (cVQD) method for calculating excited states of a general classical Hamiltonian, such as Ising Hamiltonian. We apply this scheme to the practical use case of generating photochromic diarylethene (DAE) derivatives for photopharmacology applications. Using a data set of 384 DAE derivatives quantum chemistry calculation results, we show that a factorization-machine-based model can construct an Ising Hamiltonian to accurately predict the wavelength of maximum absorbance of the derivatives, λmax\lambda_{\rm max}, for a larger set of 4096 DAE derivatives. A 12-qubit cVQD calculation for the constructed Ising Hamiltonian provides the ground and first four excited states corresponding to five DAE candidates possessing large λmax\lambda_{\rm max}. On a quantum simulator, results are found to be in excellent agreement with those obtained by an exact eigensolver. Utilizing error suppression and mitigation techniques, cVQD on a real quantum device produces results with accuracy comparable to the ideal calculations on a simulator. Finally, we show that quantum chemistry calculations for the five DAE candidates provides a path to achieving large λmax\lambda_{\rm max} and oscillator strengths by molecular engineering of DAE derivatives. These findings pave the way for future work on applying hybrid quantum-classical approaches to large system optimization and the discovery of novel materials.Comment: 13pages, 9 figure

    String Theory on AdS_3 as Discrete Light-Cone Liouville Theory

    Full text link
    We investigate (super) string theory on AdS3AdS_3 background based on an approach of free field realization. We demonstrate that this string theory can be reformulated as a string theory defined on a linear dilaton background along the transverse direction (``Liouville mode'') and compactified onto S1S^1 along a {\em light-like} direction. Under this reformulation we analyze the physical spectrum as that of a free field system, and discuss the consequences when we turn on the Liouville potential. The discrete light-cone momentum in our framework is naturally interpreted as the ``winding number'' of the long string configuration and is identified with the spectral flow parameter that is introduced in the recent work by Maldacena and Ooguri \cite{MO}. Moreover we show that there exist infinite number of the on-shell chiral primary states possessing the different light-cone momenta and the spectral flow consistently acts on the space of chiral primaries. We observe that they are also chiral primaries in the sense of space-time (or the conformal theory of long string) and the spectrum of space-time U(1)RU(1)_R charge is consistent with the expectation from the AdS3/CFT2AdS_3/CFT_2-duality. We also clarify the correspondence between our framework and the symmetric orbifold theory of multiple long string system \cite{HS2}.Comment: 41 pages, no figure, the version to appear in Nucl. Phys. B. Section 3 and 4 are improved, and a discussion about the multiple long string system is adde
    corecore